VPortPro Version 2.0: VportPro-client with Com Port Control.

Date: May 9, 2005

Labtam is pleased to announce a new software product named VPortPro Version 2.0. This is the first major release for the 2005 year.

The main utility, VPortPro Client, included in the VPortPro package makes serial (RS232) data from your PC available on TCP/IP-based networks and makes TCP/IP data available on virtual serial ports of your PC (i.e., VPortPro Client can create virtual serial ports on your PC and redirect them to remote TCP/IP ports and vice versa).

The VPortPro Client can also be used to pass serial data across a corporate intranet or over the Internet (using the Telnet protocol (with the features provided by the COM Port Control protocol specified by IETF RFC 2217) and the raw TCP connection protocol as well).

New Features on this release include:

1. VCOM-TCP Primary Client:
- improved the corresponding driver to be used on multi-CPU machines

2. COM Port Redirector:
- implemented new facility and corresponding driver to support the RAW and RFC2217 modes with physical and virtual COM ports

The following bugs have been fixed:

1. Installation:
- the silent installation did not correctly use some saved installation parameters (i.e. the "Destination directory")

4. To test the COM Port Control protocol (RFC 2217) commands, the ACORP 56000 Data/Fax/Voice modem and the DIGI One IA server have been used.

5. The current driver version allows for creating up to 10 Virtual Serial Ports.

6. Virtual COM port Driver does not work under MS Windows 2003 Server.

Single User licenses are at $120.00 USD. Please visit the Software Pricing page for pricing on Multiple Licenses.

If at anytime you require any information or assistance please do not hesitate to e-mail us at: sales@Labtam-inc.com

Download and try VPortPro software for FREE. (Demo version runs for 7 days.)

PLEASE NOTE:

The programs associated in this package may send and/or receive broadcast IP requests. Since such packets cannot cross the nearest firewall/gateway/router, please be sure that these IP requests are invisible from outside your network. We assume that such behavior cannot be considered as "Hacking" or "Trojan horse's action".